Image The "right to be forgotten", a relative right
Digital Sovereignty
The “right to be forgotten”, a relative right
Read
02
MIN
Image For a collective and collaborative cybersecurity!
04.09.20
For a collective and collaborative cybersecurity!
Read
03
MIN
Image Continuous Improvement: How do Counterproductive Routines Linger On In Security "best practices"?
Secops
04.09.20 Secops
Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”?
Read
06
MIN
Image Training the Swiss Police
Cybercrime
03.05.20 Cybercrime
Training the Swiss Police
Read
05
MIN
Image Cybersecurity: The 10 Key Trends for 2020
Digital transformation
Cybersecurity: The 10 Key Trends for 2020
Read
03
MIN
Image Presentation of the EBIOS Risk Manager method
Risks management
03.05.20 Risks management
Presentation of the EBIOS Risk Manager method
Read
06
MIN
Image FIC 2021: Building a 'Common' Digital Space
03.05.20
FIC 2021: Building a ‘Common’ Digital Space
Read
03
MIN
Image Cybersecurity: Siemens’ Commitment
01.22.20
Cybersecurity: Siemens’ Commitment
Read
03
MIN
Image Ransomware in Six Questions
Secops
01.22.20 Secops
Ransomware in Six Questions
Read
03
MIN
Image Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Secops
01.22.20 Secops
Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Read
07
MIN
Image Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Risks management
01.22.20 Risks management
Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Read
04
MIN
Image How the SPARTA Network strengthens EU’s cybersecurity capacities
Cyber stability
01.22.20 Cyber stability
How the SPARTA Network strengthens EU’s cybersecurity capacities
Read
05
MIN
Image Towards European digital sovereignty (by DG Connect, European Commission)
12.23.19
Towards European digital sovereignty (by DG Connect, European Commission)
Read
03
MIN
Image Social science and cybersecurity: a key challenge for the future
Digital transformation
Social science and cybersecurity: a key challenge for the future
Read
03
MIN
Image Why cybersecurity is a human rights issue, and it is time to start treating it like one (by Deborah Brown & Anriette Esterhuysen, Association for progressive communications)
Digital Sovereignty
Why cybersecurity is a human rights issue, and it is time to start treating it like one (by Deborah Brown & Anriette Esterhuysen, Association for progressive communications)
Read
13
MIN
Image Idiap becomes first non-US site of the Center for Identification Technology Research
Risks management
12.20.19 Risks management
Idiap becomes first non-US site of the Center for Identification Technology Research
Read
03
MIN
Image Using differential privacy to protect privacy
Secops
12.20.19 Secops
Using differential privacy to protect privacy
Read
05
MIN
Image Local authorities in midstream (by Agnès Le Brun, Vice President of the Association of Mayors of France)
12.03.19
Local authorities in midstream (by Agnès Le Brun, Vice President of the Association of Mayors of France)
Read
03
MIN
Image Hewlett Foundation will be attending FIC 2020
Cyber +
12.03.19 Cyber +
Hewlett Foundation will be attending FIC 2020
Read
04
MIN
Image The Policeman Was On A Walk Through The Files
Cybercrime
12.03.19 Cybercrime
The Policeman Was On A Walk Through The Files
Read
04
MIN
Image The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Risks management
12.03.19 Risks management
The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Read
07
MIN